Backdoor.Win32.Androm.lqql

Behavior: Backdoor Trojan Backdoor Trojans provide the author or hacker with remote-administration of victim machines. Backdoor Trojans can be instructed to send, receive, execute and delete files, harvest confidential data from the computer, log activity on the computer and more.

NOTE: The hash is only listed for the first detected malicious file. SHA/MD5 hash should not be intended as a security/antivirus solution, instead it provides you an additional information, allowing you to identify known malware files.

Take the following steps to help prevent infection on your computer:

Use up-to-date antivirus software.

Get the latest updates for Operating system and your installed software.

Use strong passwords and password management software.

Use caution when opening attachments, accepting file transfers and clicking on links to webpages.